Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 23 of 23 (0.241 secs)
You searched for: subject:"Portable Executable format"
[movies]The Life Of Binaries Day 2 Part 3 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,597
[movies]Rootkits: What they are, and how to find them. Day 1 Part 2 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,386
[movies]Rootkits: What they are, and how to find them. Day 1 Part 4 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,184
[movies]The Life Of Binaries Day 2 Part 1 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,619
[movies]Rootkits: What they are, and how to find them. Day 2 Part 4 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,106
[movies]Rootkits: What they are, and how to find them. Day 2 Part 5 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,152
[movies]Rootkits: What they are, and how to find them. Day 1 Part 1 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 2,334
[movies]Rootkits: What they are, and how to find them. Day 1 Part 6 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,143
[movies]Rootkits: What they are, and how to find them. Day 2 Part 3 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,178
[movies]Rootkits: What they are, and how to find them. Day 2 Part 2 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,194
[movies]The Life Of Binaries Day 2 Part 5 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,524
[movies]The Life Of Binaries Day 1 Part 1 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 3,544
[movies]The Life Of Binaries Day 1 Part 2 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 2,272
[movies]The Life Of Binaries Day 2 Part 2 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,792
[movies]The Life Of Binaries Day 1 Part 3 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,988
[movies]Rootkits: What they are, and how to find them. Day 1 Part 5 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,125
[movies]The Life Of Binaries Day 1 Part 5 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 2,037
[movies]The Life Of Binaries Day 1 Part 6 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 2,001
[movies]The Life Of Binaries Day 1 Part 4 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 2,008
[movies]The Life Of Binaries Day 2 Part 6 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,806
[movies]Rootkits: What they are, and how to find them. Day 1 Part 3 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,237
[movies]Rootkits: What they are, and how to find them. Day 2 Part 1 - Xeno Kovah
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; imports; IAT; Import Address Table; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; Intel; x86; Intel x86; IA32; x86 assembly; inline hooks; inline hooking; malware; stealth malware; rootkit; rootkits; Windows rootkits; rootkit detection; rootkit detector; malware detection; hooking; hooks; System Service Descriptor Table; SSDT; SSDT hooking; Interrupt Descriptor Table; IDT; IDT hooking; IO Request Packets; IRPs; IRP hooking; Master Boot Record; MBR rootkit; bootkit; Direct Kernel Object Manipulation; DKOM; Kernel Object Hooking; KOH; VirusBlokAda; Volatility; GMER; Tuluka; memory forensics; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,548
[movies]The Life Of Binaries Day 2 Part 4 - Xeno Kovah
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation...
Keywords: training; education; multi-day-class; multi-day-training; classes; computer security class; computer; computers; security; computer security; cyber security; host security; binaries; binary format; binary executable format; Windows executable; Windows PE; PE; PE/COFF; Portable Executable format; parsing; lexing; tokenizing; concrete syntax tree; parse tree; abstract syntax tree; abstract assembly tree; context free grammars; compiling; compilation; compiler; linking; linker; Intel; x86; Intel x86; IA32; x86 assembly; DOS Header; File Header; Optional Header; Section Header; imports; IAT; Import Address Table; bound imports; delayed imports; runtime imports; import by name; import by ordinal; relocations; IAT hooking; Import Address Table hooking; exports; EAT; Export Address Table; forwarded exports; relocatable code; TLS; Thread Local Storage; resources; load configuration; signed code; DEP; data execution prevention; ASLR; Address Space Layout Randomization; SEH; Structured Exception Handling; Structured Exception Handlers; computer virus; computer viruses; packers; packing; UPX; reverse engineering; debugging; debugger; WinDbg; OpenSecurityTraining.info
Downloads: 1,775
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related creators

Xeno Kovah

Related mediatypes

movies